Preferred Language
Articles
/
joe-731
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link). Based on simulation results, it is concluded that the second method consumes less time (lower transmission delay) than the first method. The delay consumed by the second method is half the delay in the first method. Also, the packet loss rate for second method is 14%, while 16% in the first method. The jitter for second method is almost similar to the jitter without link fail. Therefore, the second method led to select the path with small losses without impact on video quality. Finally, the results of two methods  are compared in terms of end to end delay, packet loss rate, and jitter.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 07 2021
Design and numerical verification of a polarization-independent grating coupler using a double-layer approach for visible wavelengths applications
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Comparison Study of Electromyography Using Wavelet and Neural Network
...Show More Authors

In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.

View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Materials Science In Semiconductor Processing
Synthesis and annealing process of ultra-large SnS nanosheets for FTO/SnS/CdS/Pt photocathode
...Show More Authors

SnS has been widely used in photoelectric devices due to its special band gap of 1.2-1.5 eV. Here, we reported on the fabrication of SnS nanosheets and the effect of synthesis condition together with heat treatment on its physical properties. The obtained band gap of the SnS nanosheets is in the rage of 1.37-1.41 eV. It was found that the photo-current density of a thin film comprised of SnS nanosheets could be enhanced significantly by annealing treatment. The maximum photo-current density of the stack structure of FTO/SnS/CdS/Pt was high as 389.5 mu A cm(-2), rendering its potential application in high efficiency solar hydrogen production.

View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Pais estimator for the reliability function of the Pareto model of Type I failure
...Show More Authors

In this paper an estimator of reliability function for the pareto dist. Of the first kind has been derived and then a simulation approach by Monte-Calro method was made to compare the Bayers estimator of reliability function and the maximum likelihood estimator for this function. It has been found that the Bayes. estimator was better than maximum likelihood estimator for all sample sizes using Integral mean square error(IMSE).

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The reasons for the failure of Bishara CO2 compressor belonging to Southern Fertilizer Company
...Show More Authors

In this research study failed Annunciation No. 10 for the fourth phase of the pressure of carbon dioxide of the company for Southern Fertilizers and repeated the failures more than once for the same gospel was a detailed study of the gospel included a series tests for properties Mechanical and Structural addition to the tests microscopic and scanning electron microscope shows m This study parameters and a failure Elal well as the existence of an old internal cracks in the metal of the Annunciation

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A realistic vision of the ration card system in Iraq for the duration (1997-2003) and (2017-2003)
...Show More Authors

Abstract:

The researcher shed light on a diet in Iraq before 2003 became in this period. And how the ration card has a variety of vocabulary and cover the need of the population of commodities and have a key role in saving Iraq from a real crisis in the period of economic siege, especially in light of the State's direction to support the agricultural sector, which in that period able to fill half of the market needs of food the basic. As well as providing strategic storage at the Ministry of Commerce enough for six months But after the events of 2003 and the crises that hit the country and the unstable security situation began to rise voices calling for reform of the ration card system as a system that is a burden on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Petroleum Science And Engineering
Operation of a MEG pilot regeneration system for organic acid and alkalinity removal during MDEA to FFCI switchover
...Show More Authors

View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire

... Show More
Preview PDF
Scopus (3)
Scopus